New! View global litigation for patent families

US8074282B1 - System, method, and computer program product for conveying a status of a plurality of security applications - Google Patents

System, method, and computer program product for conveying a status of a plurality of security applications Download PDF

Info

Publication number
US8074282B1
US8074282B1 US12624325 US62432509A US8074282B1 US 8074282 B1 US8074282 B1 US 8074282B1 US 12624325 US12624325 US 12624325 US 62432509 A US62432509 A US 62432509A US 8074282 B1 US8074282 B1 US 8074282B1
Authority
US
Grant status
Grant
Patent type
Prior art keywords
application
security
status
user
index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US12624325
Inventor
Brent J. Lymer
Brad Kingsbury
Chris Ritter
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
McAfee LLC
Original Assignee
McAfee LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Grant date

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Abstract

A system, method and computer program product are provided for displaying a status of a security application. A status of at least one security application is initially identified. An index is calculated that is representative of a degree of risk associated with the status of the at least one security application. The index is then displayed.

Description

RELATED APPLICATION(S)

This application is a continuation of U.S. application Ser. No. 11/735,877 filed on Apr. 16, 2007, now U.S. Pat. No. 7,624,450 which, in turn, is a continuation of U.S. application Ser. No. 10/325,170, now U.S. Pat. No. 7,305,709, filed on Dec. 19, 2002, which, in turn, is a continuation-in-part of U.S. application Ser. No. 10/319,288 filed on Dec. 13, 2002, which is incorporated herein by reference.

FIELD OF THE INVENTION

The present invention relates to application management, and more particularly to application status reporting.

BACKGROUND OF THE INVENTION

In the space of just a few years, the Internet—because it provides access to information, and the ability to publish information, in revolutionary ways—has emerged from relative obscurity to international prominence. Whereas in general an internet is a network of networks, the Internet is a global collection of interconnected local, mid-level, and wide-area networks that use the Internet Protocol (IP) as the network layer protocol. Whereas the Internet embraces many local- and wide-area networks, a given local- or wide-area network may or may not form part of the Internet.

As the Internet and its underlying technologies have become increasingly familiar, attention has become focused on Internet security and computer network security in general. With unprecedented access to information has also come unprecedented opportunities to gain unauthorized access to data, change data, destroy data, make unauthorized use of computer resources, interfere with the intended use of computer resources, etc. As experience has shown, the frontier of cyberspace has its share of scofflaws, resulting in increased efforts to protect the data, resources, and reputations of those embracing intranets and the Internet.

Security threats have evolved significantly with the increased popularity of the Internet. Advanced hybrid threats have been designed to attack systems on multiple fronts, sometimes searching for vulnerabilities until one is found. New threats also attempt to attack security technology itself.

Traditional consumer security software suites often include a plurality of various applications such as an anti-virus application, a firewall application, etc. In use, each application works to protect against at least one of the aforementioned threats. Together, the applications provide the comprehensive protection required in modern computing and networking environments.

As the security threats become more and more complex, however, the number of applications required to combat the threats becomes greater. With each application carrying its own functionality and reporting schemes, an administrator or user can easily become overwhelmed with security management.

DISCLOSURE OF THE INVENTION

A system, method and computer program product are provided for displaying a status of a security application. A status of at least one security application is initially identified. An index is calculated that is representative of a degree of risk associated with the status of the security application. The index is then displayed.

In one embodiment, the index may include a number between one (1) and ten (10). Moreover, a plurality of indices may be each calculated for one of a plurality of security applications.

In another embodiment, the security application may include an anti-virus security application, a firewall security application, a privacy service security application, and/or an anti-spam security application.

In one aspect of the present embodiment, the index may be associated with the status of an anti-virus security application. In such aspect, the index may reflect a signature file of the anti-virus security application. Moreover, the index may reflect a version of the anti-virus security application. Optionally, the index may be calculated using a weighted average of a plurality of aspects of the anti-virus security application.

In another aspect of the present embodiment, the index may be associated with the status of a firewall security application. In the present aspect, the index may reflect a version of the firewall security application.

In still another aspect of the present embodiment, the index may be associated with the status of a privacy service security application. As an option, the index may reflect a version of the privacy service security application.

In another embodiment, the index may include an overall index reflecting a plurality of security applications. Such overall index may be calculated using a weighted average of a plurality of separate indices associated with each of the security applications.

In still another embodiment, the index may be displayed numerically, graphically, utilizing a bar-graph, utilizing a color coding, etc. As an option, the color coding may correlate with the degree of risk associated with the status (i.e. green, amber, red).

Optionally, additional information relating to the status may be displayed upon the selection of the displayed index. Such additional information may include a link capable of being selected by a user. Action may then be taken to decrease the degree of risk associated with the status, in response to the selection of the link by the user.

Another system, method and computer program product are provided for displaying a status of a security application. A status of a security application is first identified. The status of the security application is then represented in the form of a bar graph which is displayed to a user.

Still another system, method and computer program product are provided for displaying a status of a plurality of security applications via a single interface. First determined is a degree of risk associated with a plurality of security aspects associated with a computing environment of a computer. The degree of risk associated with the security aspects may then be visually displayed utilizing a plurality of visual indicators.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a network architecture, in accordance with one embodiment.

FIG. 2 shows a representative hardware environment that may be associated with the data server computers and/or end user computers of FIG. 1, in accordance with one embodiment.

FIG. 3 illustrates a system adapted for interfacing a plurality of applications, in accordance with one embodiment.

FIG. 4 illustrates a method for managing a plurality of applications via a single interface, in accordance with one embodiment.

FIG. 5 illustrates an exemplary single graphical user interface for managing a plurality of applications, in accordance with one embodiment.

FIG. 6 illustrates an exemplary anti-virus application window associated with an anti-virus application, in accordance with one embodiment.

FIG. 7 illustrates an exemplary firewall application window associated with a firewall application, in accordance with one embodiment.

FIG. 8 illustrates an exemplary privacy service application window associated with a privacy service application, in accordance with one embodiment.

FIG. 9 illustrates an exemplary anti-spam application window associated with an anti-spam application, in accordance with one embodiment.

FIG. 10 illustrates a method for displaying a status of a security application, in accordance with one embodiment.

FIG. 11 illustrates an exemplary graphical user interface for displaying a status of at least one security application, in accordance with one embodiment.

FIG. 12 illustrates a method for alerting users of a plurality of computers of a security event via a network, in accordance with one embodiment.

FIG. 13 illustrates an exemplary graphical user interface for alerting users of a plurality of computers of a security event via a network, in accordance with one embodiment.

FIG. 14 illustrates an exemplary security alert for alerting users of a plurality of computers of a security event via a network, in accordance with one embodiment.

FIG. 15 illustrates an exemplary graphical user interface for selling application-related services, in accordance with one embodiment.

FIG. 16 illustrates an exemplary graphical user interface tailored to manage a plurality of related applications of a specific entity (i.e. company, organization, etc.), in accordance with one embodiment.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

FIG. 1 illustrates a network architecture 100, in accordance with one embodiment. As shown, a plurality of networks 102 is provided. In the context of the present network architecture 100, the networks 102 may each take any form including, but not limited to a local area network (LAN), a wide area network (WAN) such as the Internet, etc.

Coupled to the networks 102 are data server computers 104 which are capable of communicating over the networks 102. Also coupled to the networks 102 and the data server computers 104 is a plurality of end user computers 106. In order to facilitate communication among the networks 102, at least one gateway or router 108 is optionally coupled therebetween. It should be noted that each of the foregoing network devices as well as any other unillustrated devices may be interconnected by way of a plurality of network segments.

FIG. 2 shows a representative hardware environment that may be associated with the data server computers 104 and/or end user computers 106 of FIG. 1, in accordance with one embodiment. Such figure illustrates a typical hardware configuration of a workstation in accordance with a preferred embodiment having a central processing unit 210, such as a microprocessor, and a number of other units interconnected via a system bus 212.

The workstation shown in FIG. 2 includes a Random Access Memory (RAM) 214, Read Only Memory (ROM) 216, an I/O adapter 218 for connecting peripheral devices such as disk storage units 220 to the bus 212, a user interface adapter 222 for connecting a keyboard 224, a mouse 226, a speaker 228, a microphone 232, and/or other user interface devices such as a touch screen (not shown) to the bus 212, communication adapter 234 for connecting the workstation to a communication network 235 (e.g., a data processing network) and a display adapter 236 for connecting the bus 212 to a display device 238.

The workstation may have resident thereon any desired operating system. It will be appreciated that a preferred embodiment may also be implemented on platforms and operating systems other than those mentioned. A preferred embodiment may be written using JAVA, C, and/or C++ language, or other programming languages, along with an object oriented programming methodology. Object oriented programming (OOP) has become increasingly used to develop complex applications.

Our course, the various embodiments set forth herein may be implemented utilizing hardware, software, or any desired combination thereof. For that matter, any type of logic may be utilized which is capable of implementing the various functionality set forth herein.

FIG. 3 illustrates a system 300 adapted for interfacing a plurality of applications, in accordance with one embodiment. As an option, the present system 300 may be implemented in the context of the architecture of FIGS. 1 and 2. Of course, the system 300 may be implemented in any desired context.

As shown, included is a plurality of applications 301. In the context of the present description, such applications 301 may include any type of application program or computer code. For example, the applications 301 may optionally be security related. Of course, the applications 301 may be related to any other aspects such as business, maintenance, entertainment, etc. In any case, the applications may be related by the virtue of being associated with a similar aspect, purpose, etc.

In the security context, the applications 301 may include an anti-virus application 302, a firewall application 304, a privacy service application 308, an anti-spam application 306, and any other related application 310 (i.e. a utilities application, etc.).

In use, the anti-virus application 302 may be capable of scanning for viruses or other malicious code by comparing virus signature files with data located in memory or being transmitted via a network; and taking any appropriate response (i.e. quarantine data, delete data, clean data, alert user, etc.). Moreover, the firewall application 304 may be capable of blocking or alerting a user of accesses to a computer based on a predetermined set of rules or policies.

Still yet, the privacy service application 308 may be capable of protecting personal information on a computer and preventing the same from being shared. Still yet, the privacy service application 308 may be capable of preventing certain users from accessing predetermined content on a network such as the Internet. Moreover, the anti-spam application 306 may be capable of filtering electronic mail messages based on a predetermined rule set to prevent the receipt (or delivery) of unwanted e-mail.

As mentioned earlier, any other related application 310 may be included in the group of applications 301. For example, a utilities application may be included for executing various maintenance tasks associated with a computer (i.e. cleaning files, optimizing memory, etc.).

Further provided in combination with the applications 301 of the system 300 is an interface 312. In use, such interface 312 may include any specific method, technique or protocol by which an application program can communicate with an operating system or another application. In one embodiment, such interface 312 may include an application program interface.

The interface 312 may further include a graphical user interface for allowing access to the various applications 301. Such graphical user interface may further be used for indicating a status of the applications 301. More information relating to such graphical user interface will be set forth hereinafter in greater detail.

FIG. 4 illustrates a method 400 for managing a plurality of applications via a single interface, in accordance with one embodiment. As an option, the present method 400 may be implemented in the context of the system 300 of FIG. 3. Of course, however, the method 400 may be carried out in any desired environment.

In operation 402, it is determined which of a plurality of applications are installed on a computer. The identification of the installed applications may be carried out in any desired manner. For example, a simple scan of the computer may be initiated. Moreover, such identification may involve the registration of the applications upon the installation thereof. It may then be determined that one of the applications is installed or not based on whether such application is registered. Optionally, such registration may involve an application program interface such as that mentioned during reference to FIG. 3. Of course, operation 402 may be carried out in any desired manner capable of identifying which applications are currently installed. Moreover, in a situation where the applications are simultaneously installed in the form of a suite, such identification may be simplified.

Next, in operation 404, a status of each of the applications is presented via a single graphical user interface. Such single graphical user interface may take any desired form capable of simultaneously conveying a status of each of the applications. As an option, such status may be displayed via a home page of the single graphical user interface. Such home page may include a “main” page or interface associated with the graphical user interface. More information regarding an exemplary single graphical user interface that may be used in the context of the present method 400 will be set forth during reference to subsequent figures.

In operation 406, a plurality of selection icons may be displayed, where the selection icons are associated with a plurality of windows. Such windows may each correspond with one of the applications, for reasons that will soon become apparent. In the present description, such selection icons may include any visual entity that is displayed and is capable of being selected by a user. Moreover, such windows may include any frame, portion, subset, or page associated with the graphical user interface and corresponding with one of the applications.

It is then determined in decision 408 whether one of the selection icons has been selected by a user. Upon the selection of the corresponding selection icon, a user is allowed to access one of the windows. Each of the windows may include access to functionality associated with the corresponding application. Thus, a user is provided access to such functionality conveniently from the graphical user interface. Note operation 410.

FIG. 5 illustrates an exemplary single graphical user interface 500 for managing a plurality of applications, in accordance with one embodiment. Optionally, such graphical user interface 500 may be used in the context of the system 300 and method 400 of FIGS. 3 and 4, respectively. Of course, the various features of the graphical user interface 500 may be used in any desired manner.

To allow access to each of the applications via the single graphical user interface 500, the graphical user interface may include a home page 512 and a plurality of selection icons 514 for allowing access to a plurality of windows (not shown) associated with each of the applications. Optionally, such windows may each include access to functionality associated with the corresponding one of the related applications. More More information relating to such application-specific windows will be set forth in greater detail during reference to subsequent figures.

In use, the home page 512 may be adapted for displaying a visual indication as to the status of each of the applications, along with various other information. For example, a security index 516 may be provided for indicating a level of risk associated with various aspects (i.e. security aspects) of a computer or networking environment. More information relating to such security index 516 will be set forth in greater detail during reference to FIGS. 10 and 11. Further included is general information and alerts displayed in separate frames 518. As will soon become apparent, both the general information and alerts may be pushed from a server and further provide various options to a user. Thus, similar to the alerts to be described, the general information may involve dynamic functionality that changes over time, and pushed from a server to a plurality of clients. Still yet, the home page 512 may include a general update icon 520, a general additional information icon 522, a general support icon 524, and a general help icon 526.

To convey the status of each of the applications, the home page 512 of the single graphical user interface 500 may include a list 502 of a plurality of applications 504. Still yet, the single graphical user interface 500 may include a plurality of status indicators 506 adjacent to each of the applications 504 in the list 502.

Each status indicator 506 may indicate whether the corresponding application is installed. Moreover, each status indicator 506 may indicate whether the corresponding application is enabled. Still yet, each status indicator 506 may indicate whether a subscription associated with the corresponding application is expired. While this is shown to be accomplished using text, it should be noted that such status may be conveyed in any desired manner. As an option, each status indicator 506 may be color coded. For example, an icon may be included as a status indicator 506, as shown. In use, such icon may exhibit a red color to reflect the fact that an application is not installed, disabled or expired (i.e. security vulnerability present); and a green color may indicate that the application is installed and/or running (i.e. protection present). Still yet, an amber color may be used to reflect caution or some intermediate degree of vulnerability.

Of course, the status indicator 506 may include any combination of textual, graphic, numeric visuals that indicates a status of the applications 504. Moreover, such status may include installed, not installed, expired, enabled, disabled, version number or any other conceivable state of the applications.

FIG. 6 illustrates an exemplary anti-virus application window 600 associated with an anti-virus application, in accordance with one embodiment. As an option, the present window 600 may be displayed in the context of the interface 500 of FIG. 5 and, specifically, in response to the selection of one of the selection icons 514 in accordance with operations 408-410 of the method 400 FIG. 4. Of course, however, the window 600 may be used out in any desired environment.

As shown, the anti-virus application window 600 may include a control frame 602 including an enable/disable icon 604 for selectively enabling/disabling the anti-virus application by a simple mouse-click or the like. Further provided in such control frame 602 are an application-specific help icon 606 and an application-specific information icon 608. Similar to the home page of FIG. 5, the anti-virus application window 600 may include a general update icon 620, a general additional information icon 622, a general support icon 624, and a general help icon 626.

In addition to the previous features, the anti-virus application window 600 may include a scan icon 630 for scanning data on the computer. A rescue disk icon 632 is provided for creating a rescue disk capable of rebooting a computer after being infected by a virus. Still yet, a quarantine icon 634 is provided for situating an allegedly or known to be infected file in a quarantine area. Further provided is a configure icon 636 for modifying various options associated with the anti-virus application. A virus map icon 638 may be used to view concentrations of infected data and sources of viruses on a world map. A virus information icon 640 may be used to locate general information regarding various viruses.

FIG. 7 illustrates an exemplary firewall application window 700 associated with a firewall application, in accordance with one embodiment. As an option, the present window 700 may be displayed in the context of the interface 500 of FIG. 5 and, specifically, in response to the selection of one of the selection icons 514 in accordance with operations 408-410 of the method 400 FIG. 4. Of course, however, the window 700 may be used out in any desired environment.

As shown, the firewall application window 700 may include a control frame 702 including an enable/disable icon 704 for selectively enabling/disabling the firewall application by a simple mouse-click or the like. Further provided in such control frame 702 are an application-specific help icon 706 and an application-specific information icon 708. Similar to the home page of FIG. 5, the firewall application window 700 may include a general update icon 720, a general additional information icon 722, a general support icon 724, and a general help icon 726.

In addition to the previous features, the firewall application window 700 may include a firewall summary icon 730 for viewing a non-technical report of firewall activity. Moreover, an event log icon 732 may be provided for viewing a technical highly-detailed report of the firewall activity. An attack may be traced on a map utilizing a track icon 734. Still yet, the firewall application may be configured and tested utilizing a firewall configure icon 736 and firewall test icon 738, respectively.

FIG. 8 illustrates an exemplary privacy service application window 800 associated with a privacy service application, in accordance with one embodiment. As an option, the present window 800 may be displayed in the context of the interface 500 of FIG. 5 and, specifically, in response to the selection of one of the selection icons 514 in accordance with operations 408-410 of the method 400 FIG. 4. Of course, however, the window 800 may be used out in any desired environment.

As shown, the privacy service application window 800 may include a control frame 802 including an enable/disable icon 804 for selectively enabling/disabling the privacy service application by a simple mouse-click or the like. Further provided in such control frame 802 are an application-specific help icon 806 and an application-specific information icon 808. Similar to the home page of FIG. 5, the privacy service application window 800 may include a general update icon 820, a general additional information icon 822, a general support icon 824, and a general help icon 826.

The privacy service application window 800 may further include a sign out icon 830 for signing out a current user so that a next user can use a computer. This is important since the privacy service application may selectively block content based on a user profile. Moreover, a report icon 832 may be included to report Internet-related crimes via a network. Still yet, the privacy service application may be configured utilizing a configure icon 834. A privacy information icon 836 may be used to obtain additional information relating to various privacy-related subjects (i.e. On-line chatting, etc.).

FIG. 9 illustrates an exemplary anti-spam application window 900 associated with an anti-spam application, in accordance with one embodiment. As an option, the present window 900 may be displayed in the context of the interface 500 of FIG. 5 and, specifically, in response to the selection of one of the selection icons 514 in accordance with operations 408-410 of the method 400 FIG. 4. Of course, however, the window 900 may be used out in any desired environment.

As shown, the anti-spam application window 900 may include a control frame 902 including an enable/disable icon 804 for selectively enabling/disabling the anti-spam application by a simple mouse-click or the like. Further provided in such control frame 902 are an application-specific help icon 906 and an application-specific information icon 908. Similar to the home page of FIG. 5, the anti-spam application window 900 may include a general update icon 920, a general additional information icon 922, a general support icon 924, and a general help icon 926.

Moreover, the anti-spam application window 900 may further include a blocked e-mail icon 930 adapted for allowing a user to view e-mail that has been blocked by the anti-spam application. As an option, the anti-spam application may be configured utilizing a configure icon 932.

FIG. 10 illustrates a method 1000 for displaying a status of a security application, in accordance with one embodiment. As an option, the present method 1000 may be implemented in the context of the system 300 of FIG. 3. Of course, however, the method 1000 may be carried out in any desired environment.

In operation 1001, a status of at least one security application is identified. In one embodiment, the status of a plurality of applications may be identified. As set forth before, the status may include installed, not installed, expired, enabled, disabled, version number, update status or any other conceivable state of each application.

Next, in operation 1002, an individual index representative of a degree of risk associated with the status of each security application is calculated. Again, one individual index may be calculated for each security application or, in other words, a plurality of indices may be calculated for multiple security applications.

In one embodiment, each individual index may be calculated using a plurality of aspects of the status of the associated security application. Just by way of example, a signature file of the security application and/or a version of the security application may be used to calculate the individual index. More information regarding exemplary techniques of calculating the indices will be set forth in greater detail during reference to FIG. 11 and Appendix A.

As an option, each index may include a number between one (1) and ten (10). Of course, each index may include any alphanumeric range or merely include symbols, etc.

Instead of or in addition to calculating the individual index in operation 1002, an overall index may be calculated which is representative of a degree of risk associated with the collective status of the security applications. Note operation 1004. In one embodiment, such calculation may include a weighted average of the individual indices associated with each of the security applications.

In operation 1006, each individual index and/or the overall index are displayed. Of course, such display may be accomplished in any desired manner. Just by way of example, the indices may be displayed alphanumerically, graphically, utilizing a bar-graph, utilizing a color coding, etc. As an option, the color coding may correlate with the degree of risk associated with the status, as will soon become apparent during the description of the exemplary interface of the following figure.

FIG. 11 illustrates an exemplary graphical user interface 1100 for displaying a status of at least one security application, in accordance with one embodiment. Optionally, such graphical user interface 1100 may be used in the context of the system 300 and method 1000 of FIGS. 3 and 10, respectively. Of course, the various features of the graphical user interface 1100 may be used in any desired manner.

As shown, two versions 1102, 1104 of the graphical user interface 1100 are shown to reflect different statuses of the various applications associated therewith. Included with the graphical user interface 1100 is a plurality of bar graphs 1106 each associated with a corresponding application. The size of each bar graph 1106 is commensurate with a numerical index 1108 associated therewith, and optionally positioned adjacent thereto.

Moreover, the bar graphs 1106 may be color-coded. Specifically, the color of each bar graph 1106 may be based on the associated numerical index 1108. Just by way of example, each bar graph 1106 may include a red color upon the numerical index 1108 falling below a predetermined numerical index threshold, thus representing a high degree of risk associated with the current status of the associated application. Conversely, each bar graph 1106 may include a green color upon the numerical index 1108 rising above a predetermined numerical index threshold, thus representing a low degree of risk associated with the current status of the associated application.

As shown in FIG. 11, both an overall index and individual indices are provided with the graphical user interface 1100. As mentioned earlier, the various indices may be calculated in a variety of ways.

In one embodiment, an index associated with the status of an anti-virus security application may reflect a signature file of the anti-virus security application and/or a version of the anti-virus security application. Optionally, such index may be calculated using a weighted average of a plurality of aspects of the anti-virus security application including the signature file of the anti-virus security application and the version of the anti-virus security application.

In another embodiment where the index is associated with the status of a firewall security application, the index may reflect a version of the firewall security application. Similarly, in still another embodiment where the index is associated with the status of a privacy service security application, the index may reflect a version of the privacy service security application.

In yet another embodiment where the index includes an overall index reflecting a plurality of security applications, such overall index may be calculated using a weighted average of a plurality of separate indices associated with each of the security applications.

With continuing reference to FIG. 11, the various indices 1106 shown with the two versions 1102, 1104 of the graphical user interface 1100 are clearly different due to the dependence of the status of the related applications. See such application statuses listed below the indices 1106.

Appendix A sets forth a detailed exemplary technical specification for calculating and presenting the security indices set forth in FIG. 11. It should be noted that such specification is set forth for illustrative purposes only, and should not be construed as limiting in any manner.

Optionally, additional information relating to the status may be displayed upon the selection of the appropriate displayed index 1106. For example, a window associated with the appropriate application (see, for example, FIGS. 6-9) may be displayed. Such additional information may include a link capable of being selected by a user. Action may then be taken to decrease the degree of risk associated with the status, in response to the selection of the link by the user. For instance, a more recent version or update of the application may be downloaded.

FIG. 12 illustrates a method 1200 for alerting users of a plurality of computers of a security event via a network, in accordance with one embodiment. As an option, the present method 1200 may be implemented in the context of the system 300 of FIG. 3. Of course, however, the method 1200 may be carried out in any desired environment.

Initially, in operation 1202, a security alert is generated including information relating to a security event utilizing a server. The security alert may take any desired format (i.e. HTML, XML, etc.) capable of being transmitted via a network and eventually displayed on a user computer. Moreover, the information may include any data relevant to the security event. Table 1 illustrates some exemplary information that may be included with the security alert. Of course, such information is set forth for illustrative purposes only, and should not be construed as limiting in any manner.

TABLE 1
Alert status (i.e. high, medium, low, etc.)
Possible Response Actions (i.e. get security application or an
update thereof, get more information,
etc.)
Content (i.e. description of security event, etc.)

It should be noted that the foregoing alert status may be generated in any desired manner. For example, it may be gleaned from an organization such as the Anti-Virus Emergency Response Team (AVERT) administered by NETWORK ASSOCIATES, INC®.

Thus, the information may include a level of the security alert. Such level of the security alert may, in turn, reflect a level of risk associated with the security event. Moreover, the information may include at least one proposed user action relating to the security event. For example, such proposed user action may involve obtaining more information relating to the security event and/or obtaining protection from the security event. Further, the information may include a response automatically carried out in reaction to the security event. For example, such response may include scanning a computer, scanning a file, cleaning a file, and/or blocking access to a computer. Still yet, the information may simply include a description of the security event.

Next, in operation 1204, the security alert is pushed from the server to a plurality of user computers via a network such as the Internet. In the context of the present description, such pushing may include any technique where the server initiates the delivery of the security alert to the user computers.

It should be noted that the foregoing pushing may be accomplished in a variety of foreseeable ways. Just by way of example, the security alert pushed from the server to the user computers may actually come as the result of a programmed request from the user computers. That is, a client program may be used to facilitate such pushed security alerts. This program may further capture a user profile for reasons that will soon become apparent.

Still yet, the pushing may include a simple broadcasting of the security alert. In this case, the security alert may be pushed to the user computers that have access to a particular channel or frequency. Broadcast may (but not always) involve a continuous flow of information.

As mentioned earlier, a user profile may be obtained during the course of the present method 1200. In particular, in operation 1206, a status of security applications on the computer may be identified. Such user profile may include data relating to a security application installed on a computer. For example, the status may indicate whether the security application is installed, enabled, etc. Also, the status may indicate whether a subscription associated with the security application is expired.

The specific profile identified in operation 1206 may, in turn, be used to conditionally display the information of the security alert based on the status of the security application(s) on the computer. Note operation 1208.

For example, the security alert may include a plethora of user options such as updating a particular security application, etc. However, if upon delivery of the security alert, it may be determined that the particular security application is not installed, expired, etc. In such case, an option to obtain the security application may be displayed, as opposed to an option to obtain an update.

Thus, in one embodiment, a large amount of information associated with the security alert may be downloaded to accommodate the numerous statuses associated with different computers. This may be feasible, for example, since large amounts of HTML information may be efficiently transmitted over a network such as the Internet. Logic (i.e. an application program interface, plug-in, etc.) may then be used to parse the large amount of information into a subset which is to be displayed based on the status of the security applications. Of course, some of such logic may conceivably be carried out on the server such that the alerts are tailored prior to being pushed.

In any case, the security alert may be displayed in a front most window of a user interface of the computers. In the present description, such a window may include any frame, portion, etc. of the user interface. By virtue of the aforementioned pushing, such display may be carried out in an automatic fashion, thus alerting users as soon as possible. One exemplary security alert will be set forth in greater detail during reference to FIGS. 13 and 14.

FIG. 13 illustrates an exemplary graphical user interface 1300 for alerting users of a plurality of computers of a security event via a network, in accordance with one embodiment. Optionally, such graphical user interface 1300 may be used in the context of the method 1200 of FIG. 12. Of course, the various features of the graphical user interface 1300 may be used in any desired manner.

As shown, the graphical user interface 1300 includes a front most window 1304 which is automatically displayed over a background window 1302 that was running at the time the pushed security alert was received. Optionally, the front most window 1304 may be moved about the background window 1302 while a user decides how to react to the security alert.

Still yet, the user may continue work in the background window 1302 while the front most window 1304 is maintained in the foreground. Moreover, this foreground status of the front most window 1304 may be maintained despite the background window 1302 being changed as a result of the user changing applications, etc. As an option, the front most window 1304 may stay in the foreground until the user selects one of the options set forth in the security alert. More information regarding the design of a specific security alert will be set forth during reference to FIG. 14.

FIG. 14 illustrates an exemplary security alert 1400 for alerting users of a plurality of computers of a security event via a network, in accordance with one embodiment. Optionally, such security alert 1400 may be used in the context of the method 1200 of FIG. 12 and the interface 1300 of FIG. 13. Of course, the various features of the security alert 1400 may be used in any desired manner.

As shown, the security alert 1400 may include a square or rectangular window with a first portion 1402 including a description 1404 of the security event. As shown, such description includes an alert level associated with the security event. Again, such description and alert level may be pushed as part of the information corresponding with the security alert 1400.

Further provided is a second portion 1406 including a number of proposed response options displayed to the user based on the profile of the user (i.e. status of the applications on the computer, etc.). Such response options may be carried out by the selection thereof by a user utilizing a mouse-click or the like. While this may be accomplished in any desired manner, one exemplary method may include the technique set forth in U.S. Pat. No. 6,266,774 entitled “Method and system for securing, managing or optimizing a personal computer,” which is incorporated herein by reference in its entirety.

It should be noted that the security alert shown in FIG. 14 may also serve as a marketing agent in addition to its inherent security function. For example, a status of a subscription of a subscriber of an application-related service may be first identified utilizing a server. An alert may then be conditionally pushed to the subscriber of the application-related service via a network based on the status. A purchase link may then be displayed with the alert which is capable of being used by the subscriber of the application-related service to renew the subscription for the application-related service via the network.

Moreover, a status of security applications on the computer may be identified upon the receipt of a security alert like that shown in FIG. 14. A purchase link may then be conditionally displayed with the security alert based on the status of the security applications on the computer. Such purchase link is capable of being utilized by a user of the computer to purchase a service related to the security applications in response to the security event associated with the security alert.

As an option, the security alert 1400 may be color-coded to reflect a level of severity associated with the alert. For example, red may reflect a high severity (i.e. including security alerts), blue may reflect a medium severity (i.e. including application tasks), and green may reflect a low severity (i.e. including application responses, marketing or general information).

FIG. 15 illustrates an exemplary graphical user interface 1500 for selling application-related services, in accordance with one embodiment. Optionally, such graphical user interface 1500 may be used in the context of the method 400 of FIG. 4. For example, the graphical user interface 1500 may be displayed upon the selection of one of the selection icons 514 of FIG. 5, when the related application is not installed, expired, etc. Of course, the various features of the graphical user interface 1500 may be used in any desired manner.

As shown, a plurality of purchase links 1502 is conditionally displayed based on the status of the related applications on the computer. Such purchase link may be capable of being utilized by a user of the computer to purchase a service associated with the related applications via the network.

FIG. 16 illustrates an exemplary graphical user interface 1600 tailored to manage a plurality of related applications of a specific entity (i.e. company, organization, etc.), in accordance with one embodiment. Optionally, such graphical user interface 1600 may be used in the context of the method 400 of FIG. 4. Of course, the various features of the graphical user interface 1600 may be used in any desired manner.

As shown, the graphical user interface 1600 includes a field for a specific entity logo 1602 using the present system. Moreover, various tailored user options 1604 are provided to accommodate the specific needs of the entity. Also, the various selection icons 1606 may be selectively displayed based on whether the applications are being used by the entity.

To accomplish this, a plurality of fields associated with such aspects of the multi-application managing interface may be made available to a desirer or administrator. In one embodiment, such fields may be provided via a management/designer/programmer interface or the like. Such fields are subsequently filled with content tailored to an entity (i.e. a specific company) including a multiplicity of computers each equipped the multi-application managing interface. Thus, the multi-application managing interface may be displayed on the computers with the content.

Optionally, a data structure may be provided for tailoring a multi-application managing interface. Included with the data structure is a map object for mapping a plurality of fields with content tailored to an entity including a multiplicity of computers each including a multi-application managing interface. Such fields are associated with a plurality of aspects of the multi-application managing interface.

While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. For example, any of the network elements may employ any of the desired functionality set forth hereinabove. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.

Claims (28)

1. A method for displaying a status of a security application, comprising:
identifying a status of at least one security application;
calculating an index representative of a degree of risk associated with the status of the at least one security application; and
displaying the index.
2. The method as recited in claim 1, wherein the index includes a number between one (1) and ten (10).
3. The method as recited in claim 1, wherein a plurality of indices are each calculated for one of a plurality of security applications.
4. The method as recited in claim 3, wherein the security applications include security applications selected from the group consisting of an anti-virus security application, a firewall security application, a privacy service security application, and an anti-spam security application.
5. The method as recited in claim 1, wherein the index is associated with the status of an anti-virus security application.
6. The method as recited in claim 5, wherein the index reflects a signature file of the anti-virus security application.
7. The method as recited in claim 5, wherein the index reflects a version of the anti-virus security application.
8. The method as recited in claim 5, wherein the index is calculated using a weighted average of a plurality of aspects of the anti-virus security application selected from the group consisting of a signature file of the anti-virus security application and a version of the anti-virus security application.
9. The method as recited in claim 1, wherein the index is associated with the status of a firewall security application.
10. The method as recited in claim 9, wherein the index reflects a version of the firewall security application.
11. The method as recited in claim 1, wherein the index is associated with the status of a privacy service security application.
12. The method as recited in claim 11, wherein the index reflects a version of the privacy service security application.
13. The method as recited in claim 1, wherein the index includes an overall index reflecting a plurality of security applications.
14. The method as recited in claim 13, wherein the overall index is calculated using a weighted average of a plurality of separate indices associated with each of the security applications.
15. The method as recited in claim 1, wherein the index is displayed numerically.
16. The method as recited in claim 1, wherein the index is displayed graphically.
17. The method as recited in claim 16, wherein the index is displayed utilizing a bar-graph.
18. The method as recited in claim 1, wherein the index is displayed utilizing a color coding.
19. The method as recited in claim 18, wherein the color coding correlates with the degree of risk associated with the status.
20. The method as recited in claim 1, and further comprising displaying additional information relating to the status upon the selection of the displayed index.
21. The method as recited in claim 20, wherein the additional information includes a link capable of being selected by a user.
22. The method as recited in claim 21, and further comprising taking an action to decrease the degree of risk associated with the status, in response to the selection of the link by the user.
23. A computer program product for displaying a status of a security application, comprising:
computer code for identifying a status of at least one security application;
computer code for calculating an index representative of a degree of risk associated with the status of the at least one security application; and
computer code for displaying the index.
24. A system for displaying a status of a security application, comprising:
means for:
identifying a status of at least one security application,
calculating an index representative of a degree of risk associated with the status of the at least one security application, and
displaying the index.
25. A system for displaying a status of a security application, comprising:
computer code for identifying a status of at least one security application and calculating an index representative of a degree of risk associated with the status of the at least one security application; and
a graphical user interface in communication with the computer code for displaying the index.
26. A method for displaying a status of a security application, comprising:
identifying a status of a security application;
representing the status of the security application in the form of a bar graph; and
displaying the bar graph.
27. A method, comprising:
determining a degree of risk associated with a plurality of security aspects associated with a computing environment of a computer; and
visually displaying the degree of risk associated with the security aspects utilizing a plurality of visual indicators.
28. A method, comprising:
identifying a status of a plurality of security applications;
calculating an individual index representative of a degree of risk associated with the status of each of the security applications, wherein each individual index is calculated using a plurality of aspects of the status of the security applications;
calculating an overall index representative of a degree of risk associated with a collective status of the security applications, the calculating of the overall index including a weighted average of the individual indices associated with each of the security applications; and
displaying each individual index and the overall index.
US12624325 2002-12-13 2009-11-23 System, method, and computer program product for conveying a status of a plurality of security applications Active US8074282B1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US10319288 US8990723B1 (en) 2002-12-13 2002-12-13 System, method, and computer program product for managing a plurality of applications via a single interface
US10325170 US7305709B1 (en) 2002-12-13 2002-12-19 System, method, and computer program product for conveying a status of a plurality of security applications
US11735877 US7624450B1 (en) 2002-12-13 2007-04-16 System, method, and computer program product for conveying a status of a plurality of security applications
US12624325 US8074282B1 (en) 2002-12-13 2009-11-23 System, method, and computer program product for conveying a status of a plurality of security applications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12624325 US8074282B1 (en) 2002-12-13 2009-11-23 System, method, and computer program product for conveying a status of a plurality of security applications

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11735877 Continuation US7624450B1 (en) 2002-12-13 2007-04-16 System, method, and computer program product for conveying a status of a plurality of security applications

Publications (1)

Publication Number Publication Date
US8074282B1 true US8074282B1 (en) 2011-12-06

Family

ID=38775546

Family Applications (10)

Application Number Title Priority Date Filing Date
US10319288 Active 2028-07-29 US8990723B1 (en) 2002-12-13 2002-12-13 System, method, and computer program product for managing a plurality of applications via a single interface
US10325170 Active 2025-07-02 US7305709B1 (en) 2002-12-13 2002-12-19 System, method, and computer program product for conveying a status of a plurality of security applications
US11735877 Expired - Fee Related US7624450B1 (en) 2002-12-13 2007-04-16 System, method, and computer program product for conveying a status of a plurality of security applications
US11855109 Active 2024-10-15 US8115769B1 (en) 2002-12-13 2007-09-13 System, method, and computer program product for conveying a status of a plurality of security applications
US11855953 Active US7555776B1 (en) 2002-12-13 2007-09-14 Push alert system, method, and computer program product
US11855941 Active 2027-01-25 US9177140B1 (en) 2002-12-13 2007-09-14 System, method, and computer program product for managing a plurality of applications via a single interface
US12470163 Active 2023-01-13 US8230502B1 (en) 2002-12-13 2009-05-21 Push alert system, method, and computer program product
US12624325 Active US8074282B1 (en) 2002-12-13 2009-11-23 System, method, and computer program product for conveying a status of a plurality of security applications
US14581481 Pending US20150113654A1 (en) 2002-12-13 2014-12-23 System, method, and computer program product for managing a plurality of applications via a single interface
US14581286 Active 2024-04-03 US9791998B2 (en) 2002-12-13 2014-12-23 System, method, and computer program product for managing a plurality of applications via a single interface

Family Applications Before (7)

Application Number Title Priority Date Filing Date
US10319288 Active 2028-07-29 US8990723B1 (en) 2002-12-13 2002-12-13 System, method, and computer program product for managing a plurality of applications via a single interface
US10325170 Active 2025-07-02 US7305709B1 (en) 2002-12-13 2002-12-19 System, method, and computer program product for conveying a status of a plurality of security applications
US11735877 Expired - Fee Related US7624450B1 (en) 2002-12-13 2007-04-16 System, method, and computer program product for conveying a status of a plurality of security applications
US11855109 Active 2024-10-15 US8115769B1 (en) 2002-12-13 2007-09-13 System, method, and computer program product for conveying a status of a plurality of security applications
US11855953 Active US7555776B1 (en) 2002-12-13 2007-09-14 Push alert system, method, and computer program product
US11855941 Active 2027-01-25 US9177140B1 (en) 2002-12-13 2007-09-14 System, method, and computer program product for managing a plurality of applications via a single interface
US12470163 Active 2023-01-13 US8230502B1 (en) 2002-12-13 2009-05-21 Push alert system, method, and computer program product

Family Applications After (2)

Application Number Title Priority Date Filing Date
US14581481 Pending US20150113654A1 (en) 2002-12-13 2014-12-23 System, method, and computer program product for managing a plurality of applications via a single interface
US14581286 Active 2024-04-03 US9791998B2 (en) 2002-12-13 2014-12-23 System, method, and computer program product for managing a plurality of applications via a single interface

Country Status (1)

Country Link
US (10) US8990723B1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110016513A1 (en) * 2009-07-17 2011-01-20 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US20110154497A1 (en) * 2009-12-17 2011-06-23 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US20110154034A1 (en) * 2009-12-17 2011-06-23 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transactions
US20110178933A1 (en) * 2010-01-20 2011-07-21 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transaction data in transit
US8850539B2 (en) 2010-06-22 2014-09-30 American Express Travel Related Services Company, Inc. Adaptive policies and protections for securing financial transaction data at rest
US8924296B2 (en) 2010-06-22 2014-12-30 American Express Travel Related Services Company, Inc. Dynamic pairing system for securing a trusted communication channel
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US8990723B1 (en) 2002-12-13 2015-03-24 Mcafee, Inc. System, method, and computer program product for managing a plurality of applications via a single interface
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US9118710B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc System, method, and computer program product for reporting an occurrence in different manners
US9117069B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Real-time vulnerability monitoring
US9118708B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US9118709B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118711B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9350752B2 (en) 2003-07-01 2016-05-24 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product

Families Citing this family (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8359650B2 (en) * 2002-10-01 2013-01-22 Skybox Secutiry Inc. System, method and computer readable medium for evaluating potential attacks of worms
US8407798B1 (en) 2002-10-01 2013-03-26 Skybox Secutiry Inc. Method for simulation aided security event management
US8122498B1 (en) 2002-12-12 2012-02-21 Mcafee, Inc. Combined multiple-application alert system and method
US8312535B1 (en) 2002-12-12 2012-11-13 Mcafee, Inc. System, method, and computer program product for interfacing a plurality of related applications
US8239941B1 (en) * 2002-12-13 2012-08-07 Mcafee, Inc. Push alert system, method, and computer program product
JP2004234390A (en) * 2003-01-30 2004-08-19 Fujitsu Ltd Information management method, information management system, central device, terminal device and computer program
US7437763B2 (en) * 2003-06-05 2008-10-14 Microsoft Corporation In-context security advisor in a computing environment
GB2403309B (en) * 2003-06-27 2006-11-22 Hewlett Packard Development Co Apparatus for and method of evaluating security within a data processing or transactional environment
US7400878B2 (en) 2004-02-26 2008-07-15 Research In Motion Limited Computing device with environment aware features
US7533416B2 (en) * 2004-04-29 2009-05-12 Microsoft Corporation Framework for protection level monitoring, reporting, and notification
US20050257268A1 (en) * 2004-04-29 2005-11-17 Microsoft Corporation Security center
US20060075503A1 (en) * 2004-09-13 2006-04-06 Achilles Guard, Inc. Dba Critical Watch Method and system for applying security vulnerability management process to an organization
US7591018B1 (en) * 2004-09-14 2009-09-15 Trend Micro Incorporated Portable antivirus device with solid state memory
US7831840B1 (en) * 2005-01-28 2010-11-09 Novell, Inc. System and method for codifying security concerns into a user interface
US8516583B2 (en) * 2005-03-31 2013-08-20 Microsoft Corporation Aggregating the knowledge base of computer systems to proactively protect a computer from malware
US7810143B2 (en) * 2005-04-22 2010-10-05 Microsoft Corporation Credential interface
US7617530B2 (en) * 2005-04-22 2009-11-10 Microsoft Corporation Rights elevator
EP1877904B1 (en) * 2005-05-05 2015-12-30 Cisco IronPort Systems LLC Detecting unwanted electronic mail messages based on probabilistic analysis of referenced resources
US7882560B2 (en) * 2005-12-16 2011-02-01 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US8413245B2 (en) * 2005-12-16 2013-04-02 Cisco Technology, Inc. Methods and apparatus providing computer and network security for polymorphic attacks
US8495743B2 (en) * 2005-12-16 2013-07-23 Cisco Technology, Inc. Methods and apparatus providing automatic signature generation and enforcement
US9286469B2 (en) * 2005-12-16 2016-03-15 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic signature generation
GB0525871D0 (en) * 2005-12-20 2006-02-01 Symbian Software Ltd Malicious software detecting in a computing device
US7941848B2 (en) * 2006-01-30 2011-05-10 Microsoft Corporation Elevating rights
US7945951B2 (en) * 2006-01-30 2011-05-17 Microsoft Corporation Rights-context elevator
US20070198934A1 (en) * 2006-02-17 2007-08-23 Microsoft Corporation Performing a Prohibited Task
US9063633B2 (en) * 2006-03-30 2015-06-23 Arjuna Indraeswaran Rajasingham Virtual navigation system for virtual and real spaces
US7752274B2 (en) * 2006-04-03 2010-07-06 International Business Machines Corporation Apparatus and method for filtering and selectively inspecting e-mail
US8117441B2 (en) * 2006-06-20 2012-02-14 Microsoft Corporation Integrating security protection tools with computer device integrity and privacy policy
WO2009003059A1 (en) * 2007-06-25 2008-12-31 Google Inc. Zero-hour quarantine of suspect electronic messages
US9069960B1 (en) * 2007-08-31 2015-06-30 Mcafee, Inc. System, method, and computer program product for avoiding an on-access scan of data accessible by a collaborative portal application after an on-demand scan
US8504622B1 (en) * 2007-11-05 2013-08-06 Mcafee, Inc. System, method, and computer program product for reacting based on a frequency in which a compromised source communicates unsolicited electronic messages
JP5471072B2 (en) * 2009-06-26 2014-04-16 富士通株式会社 Display test equipment, display test program and display test method
WO2012037657A3 (en) 2010-09-24 2012-06-21 Research In Motion Limited Method and apparatus for differentiated access control
CN102467321A (en) * 2010-11-08 2012-05-23 腾讯科技(深圳)有限公司 Method and device for displaying engine state of anti-virus tool
US9122877B2 (en) 2011-03-21 2015-09-01 Mcafee, Inc. System and method for malware and network reputation correlation
US9106680B2 (en) 2011-06-27 2015-08-11 Mcafee, Inc. System and method for protocol fingerprinting and reputation correlation
US9639518B1 (en) 2011-09-23 2017-05-02 Amazon Technologies, Inc. Identifying entities in a digital work
US9449526B1 (en) 2011-09-23 2016-09-20 Amazon Technologies, Inc. Generating a game related to a digital work
US9613003B1 (en) 2011-09-23 2017-04-04 Amazon Technologies, Inc. Identifying topics in a digital work
US9471547B1 (en) 2011-09-23 2016-10-18 Amazon Technologies, Inc. Navigating supplemental information for a digital work
US8931043B2 (en) 2012-04-10 2015-01-06 Mcafee Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
US8972762B2 (en) 2012-07-11 2015-03-03 Blackberry Limited Computing devices and methods for resetting inactivity timers on computing devices
CN104584563A (en) * 2012-08-15 2015-04-29 网络商务普莱恩斯有限公司 Online collaborative suite
CN103116722A (en) * 2013-02-06 2013-05-22 北京奇虎科技有限公司 Processing method, processing device and processing system of notification board information
USD781869S1 (en) 2013-08-01 2017-03-21 Palantir Technologies, Inc. Display screen or portion thereof with graphical user interface
USD757028S1 (en) * 2013-08-01 2016-05-24 Palantir Technologies Inc. Display screen or portion thereof with graphical user interface
CN105580023A (en) 2013-10-24 2016-05-11 迈克菲股份有限公司 Agent assisted malicious application blocking in a network environment
US9313218B1 (en) * 2014-07-23 2016-04-12 Symantec Corporation Systems and methods for providing information identifying the trustworthiness of applications on application distribution platforms
US20160308888A1 (en) * 2015-04-17 2016-10-20 Easy Solutions Enterprises Corp. Systems and methods for detecting and addressing remote access malware
US9727737B1 (en) * 2015-07-27 2017-08-08 Amazon Technologies, Inc. Trustworthy indication of software integrity
USD802016S1 (en) 2016-06-29 2017-11-07 Palantir Technologies, Inc. Display screen or portion thereof with graphical user interface
USD803246S1 (en) 2016-06-29 2017-11-21 Palantir Technologies, Inc. Display screen or portion thereof with graphical user interface
USD802000S1 (en) 2016-06-29 2017-11-07 Palantir Technologies, Inc. Display screen or portion thereof with an animated graphical user interface
USD811424S1 (en) 2016-07-20 2018-02-27 Palantir Technologies, Inc. Display screen or portion thereof with graphical user interface

Citations (70)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5333256A (en) 1989-05-15 1994-07-26 International Business Machines Corporation Methods of monitoring the status of an application program
US5657460A (en) 1995-04-11 1997-08-12 Data View, Inc. System and method for storing and displaying data
US5870543A (en) 1995-06-07 1999-02-09 Digital River, Inc. System for preventing unauthorized copying of active software
US5956481A (en) 1997-02-06 1999-09-21 Microsoft Corporation Method and apparatus for protecting data files on a computer from virus infection
US5991881A (en) 1996-11-08 1999-11-23 Harris Corporation Network surveillance system
US6088804A (en) 1998-01-12 2000-07-11 Motorola, Inc. Adaptive system and method for responding to computer network security attacks
US6205552B1 (en) 1998-12-31 2001-03-20 Mci Worldcom, Inc. Method and apparatus for checking security vulnerability of networked devices
US6266774B1 (en) 1998-12-08 2001-07-24 Mcafee.Com Corporation Method and system for securing, managing or optimizing a personal computer
US6269456B1 (en) 1997-12-31 2001-07-31 Network Associates, Inc. Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6282709B1 (en) 1997-11-12 2001-08-28 Philips Electronics North America Corporation Software update manager
US6298445B1 (en) 1998-04-30 2001-10-02 Netect, Ltd. Computer security
US6304975B1 (en) 1996-10-07 2001-10-16 Peter M. Shipley Intelligent network security device and method
US6327594B1 (en) 1999-01-29 2001-12-04 International Business Machines Corporation Methods for shared data management in a pervasive computing environment
US6357008B1 (en) 1997-09-23 2002-03-12 Symantec Corporation Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases
US20020046299A1 (en) 2000-02-09 2002-04-18 Internet2Anywhere, Ltd. Method and system for location independent and platform independent network signaling and action initiating
US20020059095A1 (en) 1998-02-26 2002-05-16 Cook Rachael Linette System and method for generating, capturing, and managing customer lead information over a computer network
US20020078382A1 (en) 2000-11-29 2002-06-20 Ali Sheikh Scalable system for monitoring network system and components and methodology therefore
US20020133522A1 (en) 2001-03-19 2002-09-19 Greetham Laurence Raymond Apparatus for facilitating access to information
US20020147803A1 (en) 2001-01-31 2002-10-10 Dodd Timothy David Method and system for calculating risk in association with a security audit of a computer network
US20020171546A1 (en) 2001-04-18 2002-11-21 Evans Thomas P. Universal, customizable security system for computers and other devices
US6493871B1 (en) 1999-09-16 2002-12-10 Microsoft Corporation Method and system for downloading updates for software installation
US6535227B1 (en) 2000-02-08 2003-03-18 Harris Corporation System and method for assessing the security posture of a network and having a graphical user interface
US6553378B1 (en) 2000-03-31 2003-04-22 Network Associates, Inc. System and process for reporting network events with a plurality of hierarchically-structured databases in a distributed computing environment
US20030084340A1 (en) 2001-10-31 2003-05-01 Schertz Richard L. System and method of graphically displaying data for an intrusion protection system
US20030084322A1 (en) 2001-10-31 2003-05-01 Schertz Richard L. System and method of an OS-integrated intrusion detection and anti-virus system
US6567808B1 (en) 2000-03-31 2003-05-20 Networks Associates, Inc. System and process for brokering a plurality of security applications using a modular framework in a distributed computing environment
US20030120733A1 (en) 2001-12-21 2003-06-26 Forman George H. Email system that allows sender to check recipient's status before sending an email to the recipient
US20030135749A1 (en) 2001-10-31 2003-07-17 Gales George S. System and method of defining the security vulnerabilities of a computer system
US20030154269A1 (en) 2002-02-14 2003-08-14 Nyanchama Matunda G. Method and system for quantitatively assessing computer network vulnerability
US20030172301A1 (en) 2002-03-08 2003-09-11 Paul Judge Systems and methods for adaptive message interrogation through multiple queues
US20030208687A1 (en) 2002-05-06 2003-11-06 Trend Micro Incorporated Antivirus stand-alone network or internet appliance and methods therefor
US20040006704A1 (en) 2002-07-02 2004-01-08 Dahlstrom Dale A. System and method for determining security vulnerabilities
US20040015719A1 (en) 2002-07-16 2004-01-22 Dae-Hyung Lee Intelligent security engine and intelligent and integrated security system using the same
US6704874B1 (en) 1998-11-09 2004-03-09 Sri International, Inc. Network-based alert management
US6715083B1 (en) 1999-10-13 2004-03-30 Ericsson Inc. Method and system of alerting internet service providers that a hacker may be using their system to gain access to a target system
US20040064722A1 (en) 2002-10-01 2004-04-01 Dinesh Neelay System and method for propagating patches to address vulnerabilities in computers
US20040083474A1 (en) 2001-10-18 2004-04-29 Mckinlay Eric System, method and computer program product for initiating a software download
US6785732B1 (en) 2000-09-11 2004-08-31 International Business Machines Corporation Web server apparatus and method for virus checking
US20040181685A1 (en) 2002-04-01 2004-09-16 Navjot Marwaha System and method for handling distribution of alerts
US20040225877A1 (en) 2003-05-09 2004-11-11 Zezhen Huang Method and system for protecting computer system from malicious software operation
US20040250133A1 (en) 2001-09-04 2004-12-09 Lim Keng Leng Albert Computer security event management system
US20050010649A1 (en) 2003-06-30 2005-01-13 Ray Payne Integrated security suite architecture and system software/hardware
US6871214B2 (en) 2000-10-30 2005-03-22 Nortel Networks Limited Generating and providing alert messages in a communications network
US6898715B1 (en) 2000-09-12 2005-05-24 Networks Associates Technology, Inc. Response to a computer virus outbreak
US6948169B1 (en) 2000-11-16 2005-09-20 Dell Products L.P. Web-based factory manufacturing of computers in a build-to-order manufacturing environment
US6952779B1 (en) 2002-10-01 2005-10-04 Gideon Cohen System and method for risk detection and analysis in a computer network
US6966059B1 (en) 2002-03-11 2005-11-15 Mcafee, Inc. System and method for providing automated low bandwidth updates of computer anti-virus application components
US6976251B2 (en) 2001-05-30 2005-12-13 International Business Machines Corporation Intelligent update agent
US6980927B2 (en) 2002-11-27 2005-12-27 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment
US7007301B2 (en) 2000-06-12 2006-02-28 Hewlett-Packard Development Company, L.P. Computer architecture for an intrusion detection system
US7010696B1 (en) 2001-03-30 2006-03-07 Mcafee, Inc. Method and apparatus for predicting the incidence of a virus
US20060080735A1 (en) 2004-09-30 2006-04-13 Usa Revco, Llc Methods and systems for phishing detection and notification
US20060129947A1 (en) 2004-12-14 2006-06-15 Mark Joseph Hamzy Method, system and program product for screensaver breakthrough of prioritized messages
US7080000B1 (en) 2001-03-30 2006-07-18 Mcafee, Inc. Method and system for bi-directional updating of antivirus database
US7096215B2 (en) 2000-06-15 2006-08-22 International Business Machines Corporation Virus checking and reporting for computer database search results
US7114183B1 (en) 2002-08-28 2006-09-26 Mcafee, Inc. Network adaptive baseline monitoring system and method
US7127743B1 (en) 2000-06-23 2006-10-24 Netforensics, Inc. Comprehensive security structure platform for network managers
US7134141B2 (en) 2000-06-12 2006-11-07 Hewlett-Packard Development Company, L.P. System and method for host and network based intrusion detection and response
US7137145B2 (en) 2002-04-09 2006-11-14 Cisco Technology, Inc. System and method for detecting an infective element in a network environment
US7174566B2 (en) 2002-02-01 2007-02-06 Intel Corporation Integrated network intrusion detection
US7181519B2 (en) 2000-12-11 2007-02-20 Silverback Technologies, Inc. Distributed network monitoring and control system
US20070273499A1 (en) 2006-05-17 2007-11-29 Peter Chlubek Real-time multi-component web based travel safety system and method
US7305709B1 (en) * 2002-12-13 2007-12-04 Mcafee, Inc. System, method, and computer program product for conveying a status of a plurality of security applications
US7353229B2 (en) 2000-05-26 2008-04-01 Vilcauskas Jr Andrew J Post-session internet advertising system
US7434177B1 (en) 1999-12-20 2008-10-07 Apple Inc. User interface for providing consolidation and access
US7444679B2 (en) 2001-10-31 2008-10-28 Hewlett-Packard Development Company, L.P. Network, method and computer readable medium for distributing security updates to select nodes on a network
US7606821B2 (en) 2004-06-30 2009-10-20 Ebay Inc. Method and system for preventing fraudulent activities
US7640434B2 (en) 2001-05-31 2009-12-29 Trend Micro, Inc. Identification of undesirable content in responses sent in reply to a user request for content
US7882193B1 (en) 1998-12-31 2011-02-01 Symantec Corporation Apparatus and method for weighted and aging spam filtering rules
US7921459B2 (en) 2000-04-28 2011-04-05 International Business Machines Corporation System and method for managing security events on a network

Family Cites Families (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4899136A (en) 1986-04-28 1990-02-06 Xerox Corporation Data processor having a user interface display with metaphoric objects
US5121430C2 (en) 1991-02-19 2002-09-10 Quad Dimension Inc Storm alert for emergencies
US7342581B2 (en) 1996-07-18 2008-03-11 Computer Associates Think, Inc. Method and apparatus for displaying 3-D state indicators
US5970474A (en) 1997-04-24 1999-10-19 Sears, Roebuck And Co. Registry information system for shoppers
US6219698B1 (en) * 1997-12-19 2001-04-17 Compaq Computer Corporation Configuring client software using remote notification
NL1008660C2 (en) 1998-03-20 1999-09-21 Oce Tech Bv User interface for a data processing system, with monitoring command.
US6044471A (en) 1998-06-04 2000-03-28 Z4 Technologies, Inc. Method and apparatus for securing software to reduce unauthorized use
US20030191957A1 (en) * 1999-02-19 2003-10-09 Ari Hypponen Distributed computer virus detection and scanning
US6775779B1 (en) 1999-04-06 2004-08-10 Microsoft Corporation Hierarchical trusted code for content protection in computers
US6329904B1 (en) 1999-06-11 2001-12-11 Safety Through Cellular, Inc. Apparatus and method for providing weather and other alerts
US7308697B1 (en) 1999-07-14 2007-12-11 Scientific-Atlanta, Inc. Systems and methods for multimedia messaging in a cable or satellite subscriber system
US6518983B1 (en) * 1999-07-21 2003-02-11 International Business Machines Corporation Display of messages from a plurality of processes running in parallel
US6952685B1 (en) 1999-08-27 2005-10-04 Ochoa Optics Llc Music distribution system and associated antipiracy protection
US6851057B1 (en) * 1999-11-30 2005-02-01 Symantec Corporation Data driven detection of viruses
US20010042022A1 (en) 2000-01-05 2001-11-15 Kirkpatrick Michael S. Systems and methods for point of purchase product registration
US6816878B1 (en) 2000-02-11 2004-11-09 Steven L. Zimmers Alert notification system
US20020040346A1 (en) 2000-09-27 2002-04-04 Kwan Khai Hee Computer system and method for on-line generating a password protected and barcode prepaid instrument of entitlement and activating said instrument on presentation over a computer network
US7099834B2 (en) 2000-12-15 2006-08-29 International Business Machines Corporation Method, system, and program for transferring data between servers through a client computer over a network
US20020103666A1 (en) 2001-01-29 2002-08-01 Atsushi Hanai Server device, method for supporting sales performance, recording medium and data signal embodied in a carrier wave
WO2002097629A1 (en) * 2001-05-30 2002-12-05 Fox Paul D System and method for providing network security policy enforcement
US20030020867A1 (en) 2001-07-26 2003-01-30 Prisma S.R.L. Elastic hinge for eyeglasses
US7233781B2 (en) 2001-10-10 2007-06-19 Ochoa Optics Llc System and method for emergency notification content delivery
JP4043251B2 (en) 2002-02-12 2008-02-06 富士通株式会社 Server program
KR100667746B1 (en) 2002-07-15 2007-01-11 삼성전자주식회사 Information storage medium recorded drive information and method of recording the same
US6930512B2 (en) 2002-11-06 2005-08-16 Broadcom Corporation One-level zero-current-state exclusive or (XOR) gate
US7599856B2 (en) 2002-11-19 2009-10-06 Amazon Technologies, Inc. Detection of fraudulent attempts to initiate transactions using modified display objects
US8312535B1 (en) 2002-12-12 2012-11-13 Mcafee, Inc. System, method, and computer program product for interfacing a plurality of related applications
US8122498B1 (en) 2002-12-12 2012-02-21 Mcafee, Inc. Combined multiple-application alert system and method
US20050086685A1 (en) 2003-10-20 2005-04-21 New Technology Management Inc. Method and system for providing emergency alert system messages in an internet protocol
US7380711B2 (en) 2004-07-23 2008-06-03 Checkpoint Systems, Inc. Self-check system and method for protecting digital media
US7584503B1 (en) 2005-02-22 2009-09-01 Juniper Networks, Inc. Federating trust in a heterogeneous network
US8836580B2 (en) 2005-05-09 2014-09-16 Ehud Mendelson RF proximity tags providing indoor and outdoor navigation and method of use
US7603432B2 (en) 2005-06-06 2009-10-13 Aa, Llc Locality based alert method and apparatus
US20090144155A1 (en) 2007-11-26 2009-06-04 Joni Jeanette Lora Vehicular advertisement system and method
US8788606B2 (en) 2010-04-09 2014-07-22 Weather Decision Technologies, Inc. Multimedia alerting

Patent Citations (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5333256A (en) 1989-05-15 1994-07-26 International Business Machines Corporation Methods of monitoring the status of an application program
US5657460A (en) 1995-04-11 1997-08-12 Data View, Inc. System and method for storing and displaying data
US5870543A (en) 1995-06-07 1999-02-09 Digital River, Inc. System for preventing unauthorized copying of active software
US6304975B1 (en) 1996-10-07 2001-10-16 Peter M. Shipley Intelligent network security device and method
US5991881A (en) 1996-11-08 1999-11-23 Harris Corporation Network surveillance system
US5956481A (en) 1997-02-06 1999-09-21 Microsoft Corporation Method and apparatus for protecting data files on a computer from virus infection
US6357008B1 (en) 1997-09-23 2002-03-12 Symantec Corporation Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases
US6282709B1 (en) 1997-11-12 2001-08-28 Philips Electronics North America Corporation Software update manager
US6269456B1 (en) 1997-12-31 2001-07-31 Network Associates, Inc. Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6088804A (en) 1998-01-12 2000-07-11 Motorola, Inc. Adaptive system and method for responding to computer network security attacks
US20020059095A1 (en) 1998-02-26 2002-05-16 Cook Rachael Linette System and method for generating, capturing, and managing customer lead information over a computer network
US6298445B1 (en) 1998-04-30 2001-10-02 Netect, Ltd. Computer security
US6711615B2 (en) 1998-11-09 2004-03-23 Sri International Network surveillance
US6704874B1 (en) 1998-11-09 2004-03-09 Sri International, Inc. Network-based alert management
US6266774B1 (en) 1998-12-08 2001-07-24 Mcafee.Com Corporation Method and system for securing, managing or optimizing a personal computer
US7882193B1 (en) 1998-12-31 2011-02-01 Symantec Corporation Apparatus and method for weighted and aging spam filtering rules
US6205552B1 (en) 1998-12-31 2001-03-20 Mci Worldcom, Inc. Method and apparatus for checking security vulnerability of networked devices
US6327594B1 (en) 1999-01-29 2001-12-04 International Business Machines Corporation Methods for shared data management in a pervasive computing environment
US6493871B1 (en) 1999-09-16 2002-12-10 Microsoft Corporation Method and system for downloading updates for software installation
US6715083B1 (en) 1999-10-13 2004-03-30 Ericsson Inc. Method and system of alerting internet service providers that a hacker may be using their system to gain access to a target system
US7434177B1 (en) 1999-12-20 2008-10-07 Apple Inc. User interface for providing consolidation and access
US6535227B1 (en) 2000-02-08 2003-03-18 Harris Corporation System and method for assessing the security posture of a network and having a graphical user interface
US20020046299A1 (en) 2000-02-09 2002-04-18 Internet2Anywhere, Ltd. Method and system for location independent and platform independent network signaling and action initiating
US6553378B1 (en) 2000-03-31 2003-04-22 Network Associates, Inc. System and process for reporting network events with a plurality of hierarchically-structured databases in a distributed computing environment
US6567808B1 (en) 2000-03-31 2003-05-20 Networks Associates, Inc. System and process for brokering a plurality of security applications using a modular framework in a distributed computing environment
US7921459B2 (en) 2000-04-28 2011-04-05 International Business Machines Corporation System and method for managing security events on a network
US7353229B2 (en) 2000-05-26 2008-04-01 Vilcauskas Jr Andrew J Post-session internet advertising system
US7007301B2 (en) 2000-06-12 2006-02-28 Hewlett-Packard Development Company, L.P. Computer architecture for an intrusion detection system
US7134141B2 (en) 2000-06-12 2006-11-07 Hewlett-Packard Development Company, L.P. System and method for host and network based intrusion detection and response
US7096215B2 (en) 2000-06-15 2006-08-22 International Business Machines Corporation Virus checking and reporting for computer database search results
US7127743B1 (en) 2000-06-23 2006-10-24 Netforensics, Inc. Comprehensive security structure platform for network managers
US6785732B1 (en) 2000-09-11 2004-08-31 International Business Machines Corporation Web server apparatus and method for virus checking
US6898715B1 (en) 2000-09-12 2005-05-24 Networks Associates Technology, Inc. Response to a computer virus outbreak
US6871214B2 (en) 2000-10-30 2005-03-22 Nortel Networks Limited Generating and providing alert messages in a communications network
US6948169B1 (en) 2000-11-16 2005-09-20 Dell Products L.P. Web-based factory manufacturing of computers in a build-to-order manufacturing environment
US20020078382A1 (en) 2000-11-29 2002-06-20 Ali Sheikh Scalable system for monitoring network system and components and methodology therefore
US7181519B2 (en) 2000-12-11 2007-02-20 Silverback Technologies, Inc. Distributed network monitoring and control system
US20020147803A1 (en) 2001-01-31 2002-10-10 Dodd Timothy David Method and system for calculating risk in association with a security audit of a computer network
US20020133522A1 (en) 2001-03-19 2002-09-19 Greetham Laurence Raymond Apparatus for facilitating access to information
US7010696B1 (en) 2001-03-30 2006-03-07 Mcafee, Inc. Method and apparatus for predicting the incidence of a virus
US7080000B1 (en) 2001-03-30 2006-07-18 Mcafee, Inc. Method and system for bi-directional updating of antivirus database
US20020171546A1 (en) 2001-04-18 2002-11-21 Evans Thomas P. Universal, customizable security system for computers and other devices
US6976251B2 (en) 2001-05-30 2005-12-13 International Business Machines Corporation Intelligent update agent
US7640434B2 (en) 2001-05-31 2009-12-29 Trend Micro, Inc. Identification of undesirable content in responses sent in reply to a user request for content
US20040250133A1 (en) 2001-09-04 2004-12-09 Lim Keng Leng Albert Computer security event management system
US20040083474A1 (en) 2001-10-18 2004-04-29 Mckinlay Eric System, method and computer program product for initiating a software download
US7444679B2 (en) 2001-10-31 2008-10-28 Hewlett-Packard Development Company, L.P. Network, method and computer readable medium for distributing security updates to select nodes on a network
US20030084340A1 (en) 2001-10-31 2003-05-01 Schertz Richard L. System and method of graphically displaying data for an intrusion protection system
US20030084322A1 (en) 2001-10-31 2003-05-01 Schertz Richard L. System and method of an OS-integrated intrusion detection and anti-virus system
US20030135749A1 (en) 2001-10-31 2003-07-17 Gales George S. System and method of defining the security vulnerabilities of a computer system
US20030120733A1 (en) 2001-12-21 2003-06-26 Forman George H. Email system that allows sender to check recipient's status before sending an email to the recipient
US7174566B2 (en) 2002-02-01 2007-02-06 Intel Corporation Integrated network intrusion detection
US20030154269A1 (en) 2002-02-14 2003-08-14 Nyanchama Matunda G. Method and system for quantitatively assessing computer network vulnerability
US6941467B2 (en) 2002-03-08 2005-09-06 Ciphertrust, Inc. Systems and methods for adaptive message interrogation through multiple queues
US20030172301A1 (en) 2002-03-08 2003-09-11 Paul Judge Systems and methods for adaptive message interrogation through multiple queues
US6966059B1 (en) 2002-03-11 2005-11-15 Mcafee, Inc. System and method for providing automated low bandwidth updates of computer anti-virus application components
US20040181685A1 (en) 2002-04-01 2004-09-16 Navjot Marwaha System and method for handling distribution of alerts
US7137145B2 (en) 2002-04-09 2006-11-14 Cisco Technology, Inc. System and method for detecting an infective element in a network environment
US20030208687A1 (en) 2002-05-06 2003-11-06 Trend Micro Incorporated Antivirus stand-alone network or internet appliance and methods therefor
US20040006704A1 (en) 2002-07-02 2004-01-08 Dahlstrom Dale A. System and method for determining security vulnerabilities
US20040015719A1 (en) 2002-07-16 2004-01-22 Dae-Hyung Lee Intelligent security engine and intelligent and integrated security system using the same
US7114183B1 (en) 2002-08-28 2006-09-26 Mcafee, Inc. Network adaptive baseline monitoring system and method
US20040064722A1 (en) 2002-10-01 2004-04-01 Dinesh Neelay System and method for propagating patches to address vulnerabilities in computers
US6952779B1 (en) 2002-10-01 2005-10-04 Gideon Cohen System and method for risk detection and analysis in a computer network
US6980927B2 (en) 2002-11-27 2005-12-27 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment
US7555776B1 (en) 2002-12-13 2009-06-30 Mcafee, Inc. Push alert system, method, and computer program product
US7624450B1 (en) 2002-12-13 2009-11-24 Mcafee, Inc. System, method, and computer program product for conveying a status of a plurality of security applications
US7305709B1 (en) * 2002-12-13 2007-12-04 Mcafee, Inc. System, method, and computer program product for conveying a status of a plurality of security applications
US20040225877A1 (en) 2003-05-09 2004-11-11 Zezhen Huang Method and system for protecting computer system from malicious software operation
US20050010649A1 (en) 2003-06-30 2005-01-13 Ray Payne Integrated security suite architecture and system software/hardware
US7606821B2 (en) 2004-06-30 2009-10-20 Ebay Inc. Method and system for preventing fraudulent activities
US20060080735A1 (en) 2004-09-30 2006-04-13 Usa Revco, Llc Methods and systems for phishing detection and notification
US20060129947A1 (en) 2004-12-14 2006-06-15 Mark Joseph Hamzy Method, system and program product for screensaver breakthrough of prioritized messages
US20070273499A1 (en) 2006-05-17 2007-11-29 Peter Chlubek Real-time multi-component web based travel safety system and method

Non-Patent Citations (54)

* Cited by examiner, † Cited by third party
Title
"Norton AntiVirus Corporate Edition User's Guide," EIC 2100, Copyright © 1999, 2000 Symantec Corporation, Documentation Version 7.5, 37 pages.
"Norton AntiVirus User's Guide: Norton AntiVirus 2002," Copyright © 2001 Symantec Corporation, Documentation version 8.0, PN: 07-30-00469, 90 pages.
"Norton Internet Security 2003: User's Guide," Copyright © 2002 Symantec Corporation, Documentation version 6.0, PN: 10024898, 255 pages.
"Norton Internet Security Professional User's Guide: Norton Internet Security 2002 Profession Edition," Copyright © 2001, Symantec Corporation, Documentation version 1.0, PN: 07-30-00481, 253 pages.
"Norton Internet Security User's Guide: Norton Internet Security 2001," Copyright © 1995-2000 Symantec Corporation, Documentation version 2.5, PN: 07-30-00432, 61 pages.
Advisory Action dated Feb. 14, 2007, U.S. Appl. No. 10/319,288.
Advisory Action dated Jan. 29, 2010, U.S. Appl. No. 10/318,559.
Advisory Action dated Mar. 30, 2007, U.S. Appl. No. 10/318,559.
Dale Farris, "Ontrack SystemSuite 3.0," obtained from http ://web.archive.org/web/20010427043719/http://www.gtpcc.org/gtpcc/systemsuite.htm generated on Feb. 2, 2011, 9 pages.
Examiner's Answer dated Apr. 17, 2008, U.S. Appl. No. 10/318,693.
Examiner's Answer dated Oct. 29, 2009, U.S. Appl. No. 10/325,025.
Final Office Action dated Dec. 2, 2008 U.S. Appl. No. 10/325,025.
Final Office Action dated Feb. 25, 2008, U.S. Appl. No. 10/318,559.
Final Office Action dated Jan. 11, 2007, U.S. Appl. No. 10/318,599.
Final Office Action dated Jan. 29, 2007, U.S. Appl. No. 10/325,025.
Final Office Action dated May 30, 2007, U.S. Appl. No. 10/318,693.
Final Office Action dated Nov. 1, 2006, U.S. Appl. No. 10/319,288.
Final Office Action dated Nov. 12, 2009, U.S. Appl. No. 10/318,559.
Final Office Action dated Nov. 28, 2007 U.S. Appl. No. 10/319,288.
Final Office Action dated Nov. 3, 2010, U.S. Appl. No. 11/855,109.
Final Office Action dated Oct. 5, 2006, U.S. Appl. No. 10/318,693.
Final Office Action dated Sep. 17, 2009, U.S. Appl. No. 10/319,288.
News Release "Symantec to Support New Version of Virus Scanning API for Microsoft Exchange 2000" Jun. 25, 2001, Cupertino, CA, retrieved from http://www.symantec.com/press/2001/n010625a.html on Feb. 8, 2011.
Non-Final Office Action Summary from U.S. Appl. No. 11/855,109 mailed on May 14, 2010.
Notice of Allowance dated Feb. 24, 2009, U.S. Appl. No. 11/855,953.
Notice of Allowance dated Feb. 5, 2007, U.S. Appl. No. 10/325,170.
Notice of Allowance dated Jul. 29, 2009 U.S. Appl. No. 11/735,877.
Office Action dated Apr. 18, 2006, U.S. Appl. No. 10/319,288.
Office Action dated Apr. 24, 2009, U.S. Appl. No. 10/318,559.
Office Action dated Aug. 18, 2008, U.S. Appl. No. 11/855,953.
Office Action dated Aug. 18, 2010 U.S. Appl. No. 10/318,559.
Office Action dated Aug. 25, 2010, U.S. Appl. No. 11/855,072.
Office Action dated Dec. 14, 2010, U.S. Appl. No. 12/324,325.
Office Action dated Dec. 21, 2006, U.S. Appl. No. 10/318,693.
Office Action dated Dec. 24, 2008, U.S. Appl. No. 11/735,877.
Office Action dated Feb. 5, 2009, U.S. Appl. No. 10/319,288.
Office Action dated Jul. 22, 2010, U.S. Appl. No. 11/855,941 U.S. Appl. No. 10/319,288.
Office Action dated Jul. 24, 2007, U.S. Appl. No. 10/318,559.
Office Action dated Jul. 3, 2008, U.S. Appl. No. 10/318,559.
Office Action dated Jul. 5, 2006, U.S. Appl. No. 10/325,170.
Office Action dated Jun. 14, 2007, U.S. Appl. No. 10/319,288.
Office Action dated Jun. 21, 2006, U.S. Appl. No. 10/318,559.
Office Action dated Jun. 22, 2006, U.S. Appl. No. 10/325,025.
Office Action dated May 14, 2010, U.S. Appl. No. 11/855,109.
Office Action dated May 16, 2006, U.S. Appl. No. 10/318,559.
Office Action dated May 16, 2008, U.S. Appl. No. 10/325,025.
Office Action dated May 8, 2006, U.S. Appl. No. 10/318,693.
Office Action dated Nov. 10, 2008, U.S. Appl. No. 10/318,559.
Office Action dated Oct. 17, 2007, U.S. Appl. No. 10/325,025.
Office Action dated Sep. 9, 2010 U.S. Appl. No. 10/325,025.
Phillips, et al. "A Graph-Based System for Network Vulnerability Analysis" ACM, 1999 pp. 71-79.
US Application for "Combined Multiple-Application Alert System and Method," U.S. Appl. No. 10/318,693.
US Application for "System, Method and Computer Program Product for Managing a Plurality of Applications via a Single Interface" U.S. Appl. No. 10/319,288.
US Application for "System, Method, and Computer Program Product for Conveying a Status of a Plurality of Security Applications," U.S. Appl. No. 10/325,170.

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8990723B1 (en) 2002-12-13 2015-03-24 Mcafee, Inc. System, method, and computer program product for managing a plurality of applications via a single interface
US9118709B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9350752B2 (en) 2003-07-01 2016-05-24 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9225686B2 (en) 2003-07-01 2015-12-29 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118708B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US9118711B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9117069B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Real-time vulnerability monitoring
US9118710B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc System, method, and computer program product for reporting an occurrence in different manners
US8752142B2 (en) 2009-07-17 2014-06-10 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US9378375B2 (en) 2009-07-17 2016-06-28 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US9635059B2 (en) 2009-07-17 2017-04-25 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US9848011B2 (en) 2009-07-17 2017-12-19 American Express Travel Related Services Company, Inc. Security safeguard modification
US20110016513A1 (en) * 2009-07-17 2011-01-20 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US8955140B2 (en) 2009-12-17 2015-02-10 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US20110154497A1 (en) * 2009-12-17 2011-06-23 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US9756076B2 (en) 2009-12-17 2017-09-05 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transactions
US9712552B2 (en) 2009-12-17 2017-07-18 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US20110154034A1 (en) * 2009-12-17 2011-06-23 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transactions
US8621636B2 (en) 2009-12-17 2013-12-31 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US20110178933A1 (en) * 2010-01-20 2011-07-21 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transaction data in transit
US9514453B2 (en) 2010-01-20 2016-12-06 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transaction data in transit
US8650129B2 (en) * 2010-01-20 2014-02-11 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transaction data in transit
US9213975B2 (en) 2010-06-22 2015-12-15 American Express Travel Related Services Company, Inc. Adaptive policies and protections for securing financial transaction data at rest
US8850539B2 (en) 2010-06-22 2014-09-30 American Express Travel Related Services Company, Inc. Adaptive policies and protections for securing financial transaction data at rest
US8924296B2 (en) 2010-06-22 2014-12-30 American Express Travel Related Services Company, Inc. Dynamic pairing system for securing a trusted communication channel
US9847995B2 (en) 2010-06-22 2017-12-19 American Express Travel Related Services Company, Inc. Adaptive policies and protections for securing financial transaction data at rest

Also Published As

Publication number Publication date Type
US8230502B1 (en) 2012-07-24 grant
US7305709B1 (en) 2007-12-04 grant
US7555776B1 (en) 2009-06-30 grant
US8990723B1 (en) 2015-03-24 grant
US9791998B2 (en) 2017-10-17 grant
US20150113654A1 (en) 2015-04-23 application
US20150113421A1 (en) 2015-04-23 application
US9177140B1 (en) 2015-11-03 grant
US7624450B1 (en) 2009-11-24 grant
US8115769B1 (en) 2012-02-14 grant

Similar Documents

Publication Publication Date Title
Lunt Detecting intruders in computer systems
US7159237B2 (en) Method and system for dynamic network intrusion monitoring, detection and response
US6963978B1 (en) Distributed system and method for conducting a comprehensive search for malicious code in software
US7478420B2 (en) Administration of protection of data accessible by a mobile device
US20070266433A1 (en) System and Method for Securing Information in a Virtual Computing Environment
US20080047009A1 (en) System and method of securing networks against applications threats
US6981280B2 (en) Intelligent network scanning system and method
US20060218640A1 (en) System, Method and Computer Readable Medium for Evaluating a Security Characteristic
US20060031938A1 (en) Integrated emergency response system in information infrastructure and operating method therefor
US20080201401A1 (en) Secure server authentication and browsing
US20060161987A1 (en) Detecting and remedying unauthorized computer programs
US20060150249A1 (en) Method and apparatus for predictive and actual intrusion detection on a network
US20030167308A1 (en) Method and system for screening remote site connections and filtering data based on a community trust assessment
US20050066165A1 (en) Method and system for protecting confidential information
US20060094400A1 (en) System and method for filtering access points presented to a user and locking onto an access point
US20020138416A1 (en) Object-oriented method, system and medium for risk management by creating inter-dependency between objects, criteria and metrics
US6892241B2 (en) Anti-virus policy enforcement system and method
US20050120054A1 (en) Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications
US20100192201A1 (en) Method and Apparatus for Excessive Access Rate Detection
US20080052395A1 (en) Administration of protection of data accessible by a mobile device
US20060037077A1 (en) Network intrusion detection system having application inspection and anomaly detection characteristics
US20110214182A1 (en) Methods for proactively securing a web application and apparatuses thereof
US20070118909A1 (en) Method for the detection and visualization of anomalous behaviors in a computer network
US8046835B2 (en) Distributed computer network security activity model SDI-SCAM
US8181253B1 (en) System and method for reducing security risk in computer network

Legal Events

Date Code Title Description
AS Assignment

Owner name: MCAFEE, INC., CALIFORNIA

Free format text: MERGER;ASSIGNOR:NETWORKS ASSOCIATES TECHNOLOGY, INC.;REEL/FRAME:023568/0193

Effective date: 20041119

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: MCAFEE, LLC, CALIFORNIA

Free format text: CHANGE OF NAME AND ENTITY CONVERSION;ASSIGNOR:MCAFEE, INC.;REEL/FRAME:043665/0918

Effective date: 20161220

AS Assignment

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045056/0676

Effective date: 20170929

Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045055/0786

Effective date: 20170929